Sciweavers

1470 search results - page 237 / 294
» DEFACTO: A Design Environment for Adaptive Computing Technol...
Sort
View
IMC
2004
ACM
15 years 3 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 4 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
INFOSCALE
2006
ACM
15 years 3 months ago
A library of constructive skeletons for sequential style of parallel programming
Abstract— With the increasing popularity of parallel programming environments such as PC clusters, more and more sequential programmers, with little knowledge about parallel arch...
Kiminori Matsuzaki, Hideya Iwasaki, Kento Emoto, Z...
SAC
2009
ACM
15 years 2 months ago
Using a product line for creating component systems
Component systems have become a wide-spread technology and found their place in several application domains. Each component system has its specifics and particularities that re...
Tomás Bures, Petr Hnetynka, Michal Malohlav...
DAC
2007
ACM
15 years 10 months ago
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors
Minimizing power consumption is vitally important in embedded system design; power consumption determines battery lifespan. Ultralow-power designs may even permit embedded systems...
Changyun Zhu, Zhenyu (Peter) Gu, Li Shang, Robert ...